Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 18:55
Static task
static1
Behavioral task
behavioral1
Sample
b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe
Resource
win10v2004-20231023-en
General
-
Target
b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe
-
Size
2.0MB
-
MD5
081752719585907d695572f13eb421c3
-
SHA1
bd8d5875c1eaf24ba142e2e6dcf54fe19f5fdf98
-
SHA256
b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8
-
SHA512
7635f5271d7d21ceb09ec22fa520e368d87f82864ee51b3616b6c919f17854383063d51933468396163ebabd64ba4b485a54188106b0a19b310c354fa311f785
-
SSDEEP
49152:Y0MjjHCNtsXw5O+LN8J24pkypkkkXUzqnLnteAVD/Oo2TC33GdQLNR:r+ULL8YkAV/yTaWaR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 748 b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe -
Executes dropped EXE 1 IoCs
pid Process 748 b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 13 IoCs
pid pid_target Process procid_target 4292 2540 WerFault.exe 85 8 748 WerFault.exe 93 1628 748 WerFault.exe 93 3560 748 WerFault.exe 93 2192 748 WerFault.exe 93 3460 748 WerFault.exe 93 1844 748 WerFault.exe 93 4520 748 WerFault.exe 93 2180 748 WerFault.exe 93 3580 748 WerFault.exe 93 3268 748 WerFault.exe 93 3440 748 WerFault.exe 93 3496 748 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 748 b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe 748 b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2540 b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 748 b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2540 wrote to memory of 748 2540 b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe 93 PID 2540 wrote to memory of 748 2540 b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe 93 PID 2540 wrote to memory of 748 2540 b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe"C:\Users\Admin\AppData\Local\Temp\b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 3522⤵
- Program crash
PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exeC:\Users\Admin\AppData\Local\Temp\b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 3443⤵
- Program crash
PID:8
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 6203⤵
- Program crash
PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 6363⤵
- Program crash
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 6723⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 7603⤵
- Program crash
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 9003⤵
- Program crash
PID:1844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 14203⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 13363⤵
- Program crash
PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 14883⤵
- Program crash
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 14243⤵
- Program crash
PID:3268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 15323⤵
- Program crash
PID:3440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 6523⤵
- Program crash
PID:3496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2540 -ip 25401⤵PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 748 -ip 7481⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 748 -ip 7481⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 748 -ip 7481⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 748 -ip 7481⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 748 -ip 7481⤵PID:804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 748 -ip 7481⤵PID:1672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 748 -ip 7481⤵PID:3748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 748 -ip 7481⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 748 -ip 7481⤵PID:1820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 748 -ip 7481⤵PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 748 -ip 7481⤵PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 748 -ip 7481⤵PID:4768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\b275ad27ef28f1b0b47244b594b6af00d12c715eb8cf3f61c0109ccf52b2beb8.exe
Filesize2.0MB
MD5240cf15b12c3ce01e4cb07f826ffc6ba
SHA107b21318208058f35e141de0f08608f71bd2f56b
SHA256409ec15d452d6b7ea82d686c1dda4cdda8df47e31c7dc2525efb3be6ec7f1a87
SHA512760f2e2a5682f6c49dcb7cc7922fb127f2d631dd334a490c8204da560d940f24b6efda9ed2974f088a23ec30bc634acaffb666e3617b9ebfd4b3ea011db230fd